Brent R.

Brent R. Beachem, Riverton, UT US

Patent application number

Description

Published

20100100738

METHOD FOR ESTABLISHING A SECURE AD HOC WIRELESS LAN - Secure communications on a network. An unauthenticated client on an network sends start packets to locate other clients. The unauthenticated client receives responses to the start packets from other clients on the network. The responses may be advertise packets that are from advertising clients that may be authenticated clients or other unauthenticated clients in authenticated mode. The unauthenticated client prioritizes the received packets so that authentication can be performed with the most desirable advertising client. Authentication packets are sent and received between the unauthenticated client and the advertising client in an attempt to authenticate.

04-22-2010

20100153696

Pre-boot securing of operating system (OS) for endpoint evaluation - Methods and apparatus involve evaluating endpoint computing assets. The endpoint has both a traditional operating system for applications, and the like, and another operating system during a pre-boot phase of operation. During use, the traditional operating system identifies a last evaluation status of the computing device at a time just prior to shutting down. Upon a next booting, the pre-boot operating system loads and examines [reads] the last evaluation status. If the last evaluation status requires any completion action in order to comply with a predetermined computing policy, either or both the operating systems attend to its effectuation, including communication/handoff by way of one or more security agents. In a variety of ways, effectuation occurs by: determining a present location of the computing device, quarantining the computing device from certain network traffic; VPN enforcement; patching applications; firewall involvement; etc. Computer program products are also disclosed.

06-17-2010

20100235514

Securing a network connection by way of an endpoint computing device - Methods and apparatus involve securing a network connection by way of mobile, endpoint computing assets. The endpoints have one or more pre-defined security policies governing the connection that are balanced against competing interests of actually maintaining connections between devices, especially in WiMAX, MANET, MESH, or other ad hoc computing environments where poor security, signal strength, fragile connections or mobility issues are of traditional concern. In this manner, connections will not be lost over security enforcement in an otherwise hostile environment. The security policies are enforced in a variety of ways, but may be altered to lesser policies or not-so-strictly enforced so as to maintain satisfactory connections between devices. Other embodiments contemplate analyzing connectivity components before connection and selecting only those components that enable full or best compliance with the policies. Still other embodiments contemplate altering connections in order to maintain full enforcement of policies. Computer program products are also disclosed.

09-16-2010

20100293610

ENFORCING SECURE INTERNET CONNECTIONS FOR A MOBILE ENDPOINT COMPUTING DEVICE - Methods and apparatus enforce a secure internet connection from a mobiles endpoint computing device. A security policy for the endpoint is defined based on its location. From that location, an internet connection is established and detected. This event triggers the launching of a full VPN tunnel connection including an NDIS firewall forcing packet traffic through a port of the endpoint computing device assigned by the security policy and/or MAC/IP addresses of a VPN concentrator. Thereafter, the packet traffic is monitored for compliance with the security policy. This includes determining whether packet traffic over the assigned port is observed within a given time or packet traffic is attempted over other ports. Monitoring occurs whether or not the protocol of the VPN tunnel connection is known. Other features contemplate quarantining for improper operation of the VPN tunnel, undertaking remediation, and computer program products, to name a few.

11-18-2010

20100303240

KEY MANAGEMENT TO PROTECT ENCRYPTED DATA OF AN ENDPOINT COMPUTING DEVICE - Methods and apparatus involve protecting encrypted data of endpoint computing assets by managing decryption keys. The endpoint has both a traditional operating system for applications, and the like, and another operating system during a pre-boot phase of operation. During use, the pre-boot operating system prevents users of the endpoint from accessing the encrypted data and the key. Upon determining the encrypted data has been compromised, the key is disassociated from the encrypted data. Disassociation can occur in a variety of ways including deleting or scrambling the key and/or data or re-encrypting the encrypted data with a new key. Key escrowing and updating through the pre-boot is further contemplated. The pre-boot phase also contemplates a limited computing connection between the endpoint and a specified authentication server and approved networking ports, USB devices and biometric equipment. Security policies and enforcement modules are also disclosed as are computer program products, computing arrangements, etc.

12-02-2010

20110078797

Endpoint security threat mitigation with virtual machine imaging - Methods and apparatus involve the mitigation of security threats at a computing endpoint, such as a server, including dynamic virtual machine imaging. During use, a threat assessment is undertaken to determine whether a server is compromised by a security threat. If so, a countermeasure to counteract the security threat is developed and installed on a virtual representation of the server. In this manner, the compromised server can be replaced with its virtual representation, but while always maintaining the availability of the endpoint in the computing environment. Other features contemplate configuration of the virtual representation from a cloned image of the compromised server at least as of a time just before the compromise and configuration on separate or same hardware platforms. Testing of the countermeasure to determine success is another feature as is monitoring data flows to identifying compromises, including types or severity. Computer program products and systems are also taught.

03-31-2011

20120151200

REMOTE MANAGEMENT OF ENDPOINT COMPUTING DEVICE WITH FULL DISK ENCRYPTION - Methods and apparatus involve protecting data encrypted by a first key on an endpoint computing asset including a drive with full disk encryption. The endpoint has both a main operating system for applications, and the like, and another operating system during a pre-boot phase of operation. During use, the pre-boot operating system prevents a user of the endpoint from accessing the encrypted data and the key. In one embodiment, an information exchange partition on the endpoint is accessible from a remote location and includes data encrypted using a second key accessible to both the pre-boot operating system and the main operating system. Another embodiment allows for the provision of a network connection to the endpoint during the pre-boot phase of operation in accordance with a security policy.

06-14-2012

Patent applications by Brent R. Beachem, Riverton, UT US

Brent R. Constantz, Cupertino, CA US

Patent application number

Description

Published

20080241206

CALCIUM PHOSPHATE CEMENTS COMPRISING AUTOLOGOUS BONE - Aspects of the invention include methods for producing flowable compositions, e.g. pastes, that set into calcium phosphate containing products, where the products include autologous bone. Aspects of the invention further include compositions produced by the methods, as well as kits for preparing the same. The subject methods and compositions produced thereby find use in a variety of applications, including hard tissue repair applications.

10-02-2008

Patent applications by Brent R. Constantz, Cupertino, CA US

Brent R. Constantz US

Patent application number

Description

Published

20110297600

DESALINATION METHODS AND SYSTEMS THAT INCLUDE CARBONATE COMPOUND PRECIPITATION - Desalination methods that include carbonate compound precipitation are provided. In certain embodiments, feed water is subjected to carbonate compound precipitation conditions prior to desalination. In certain embodiments, desalination waste brine is subjected to carbonate compound precipitation conditions. In yet other embodiments, both feed water and waste brine are subjected to carbonate compound precipitation conditions. Aspects of embodiments of the invention include carbon dioxide sequestration. Embodiments of the invention further employ a precipitate product of the carbonate compound precipitation conditions as a building material, e.g., a cement. Also provided are systems configured for use in methods of the invention.

12-08-2011

Brent R. Dohnar, Concord, OH US

Patent application number

Description

Published

20090298729

Star Polymer Lubricating Composition - The invention provides a lubricating composition containing (a) 0.001 wt % to 15 wt % of a polymer with radial or star architecture; (b) an overbased detergent; (c) a dispersant; and (d) an oil of lubricating viscosity. The invention further provides a method for lubricating a mechanical device with the lubricating composition.

12-03-2009

Brent R. Inches, Rochester, MN US

Patent application number

Description

Published

20150205645

SELECTIVE LOCKING OF OPERATIONS ON JOINT AND DISJOINT SETS - A management controller in a distributed network switch may operate on sets of ports such that sets of ports containing a same port are processed serially, and sets that do not contain any of the same ports can be processed in parallel. When receiving a set of ports for processing, the management controller organizes the ports into lanes that each correspond to a unique port. If any of the lanes overlap, subsequent port sets are blocked from proceeding until the lanes of preceding port sets are cleared. If no lanes overlap, the sets may be deemed disjoint, and subsequent port sets may be processed in parallel.

07-23-2015

20150207694

SELECTIVE LOCKING OF OPERATIONS ON JOINT AND DISJOINT SETS - A management controller in a distributed network switch may operate on sets of ports such that sets of ports containing a same port are processed serially, and sets that do not contain any of the same ports can be processed in parallel. When receiving a set of ports for processing, the management controller organizes the ports into lanes that each correspond to a unique port. If any of the lanes overlap, subsequent port sets are blocked from proceeding until the lanes of preceding port sets are cleared. If no lanes overlap, the sets may be deemed disjoint, and subsequent port sets may be processed in parallel.

07-23-2015

Brent R. Knox-Holmes, East Farndon GB

Patent application number

Description

Published

20140290484

System and Method For Treating A Saline Feed Stream To An Electro-Chlorination Unit - A system to reduce scaling within or downstream of an electrolytic cell includes sulfate removal membranes located upstream of one or more electrolytic cells which are arranged to receive a permeate feed stream from the sulfate removal membranes. The membranes can be nanofiltration membranes. The saline feed stream, permeate feed stream, or both may be de-aerated streams. The electrolytic cells may be part of an electro-chlorination unit and can be divided electrolytic cells.

10-02-2014

Brent R. Matzelle, Philadelphia, PA US

Patent application number

Description

Published

20090144158

System And Method For Enabling Viewing Of Documents Not In HTML Format - A system and method for enabling viewing of non-HTML content. A content provider receives a request to view non-HTML content from a user and forwards JavaScript code to the user. The content provider sends the non-HTML content over a network to a document hosting service. The document hosting service receives the content, converts it into at least one image and assigns a URL to the at least one image. The JavaScript generates the URL at the user's computer. The document hosting service receives the request for the URL from the user and forwards the at least one image to the user.

Brent R. Smith US

Patent application number

Description

Published

20110119150

OUTSOURCED GENERATION OF BEHAVIOR-BASED CONTENT - A service is disclosed for enabling web sites and other entities to provide item recommendations and other behavior-based content to end users. The service can be implemented as a web service that is remotely accessible over the Internet. Web sites use the web service's interface to report events descriptive of item-related actions performed by end users (e.g., item views, item purchases, searches for items, etc.). The web service analyzes the reported event data on an aggregated basis to detect various types of associations between particular items, and stores resulting datasets that map items to associated items. The web service's interface also provides various API calls for enabling the web sites to request item recommendations and other behavior-based content, including but not limited to personalized recommendations that are based on the event history of the target user.

05-19-2011

20130013749

SERVICES FOR PROVIDING ITEM ASSOCIATION DATA - A service is disclosed for enabling web sites and other entities to provide item recommendations and other behavior-based content to end users. The service can be implemented as a web service that is remotely accessible over the Internet. Web sites use the web service's interface to report events descriptive of item-related actions performed by end users (e.g., item views, item purchases, searches for items, etc.). The web service analyzes the reported event data on an aggregated basis to detect various types of associations between particular items, and stores resulting datasets that map items to associated items. The web service's interface also provides various API calls for enabling the web sites to request item recommendations and other behavior-based content, including but not limited to personalized recommendations that are based on the event history of the target user. Advantageously, the web sites need not host the infrastructure for providing such content.

01-10-2013

Brent R. Sovoda, Dearborn, MI US

Patent application number

Description

Published

20090278333

INTEGRATED TOW HOOK AND BUMPER MOUNTING BRACKET - An integrated tow hook and vehicle bumper mounting bracket assembly including a mounting bracket including a frame mounting surface and a bumper mounting surface. A vehicle bumper assembly may be removably securable to the bumper mounting surface of the mounting bracket, and a tow hook may be removably securable to the frame mounting surface of the mounting bracket by one or more mechanical fasteners. The mechanical fastener used to secure the tow hook to the mounting bracket may further serve to secure the mounting bracket to a vehicle frame.

Brent R. Tholke, Cincinnati, OH US

Patent application number

Description

Published

20090314393

HIGH PRESSURE TURBINE AIRFOIL RECOVERY DEVICE AND METHOD OF HEAT TREATMENT - Provided is a method for heat treating a precipitation-hardened article having a thick section and a thin section so that the thin section can be solution annealed while the metallurgical structure of the thick section is substantially unaffected by the solution-annealing process. The method restores the microstructure of the thin section uniformly by solution annealing the thin section to achieve a preselected microstructure but without affecting the microstructure of the thick section.

12-24-2009

Brent R. Walworth, Belgium BE

Patent application number

Description

Published

20150065665

PROCESS - The present invention relates to the treatment and recycle of effluent streams from a polymerisation process, and in particular provides a polymerisation process comprising the steps of: 1) Polymerising a monomer and a comonomer in a polymerisation reaction, 2) Withdrawing an effluent stream comprising solid polymer and a mixture comprising unreacted monomer and unreacted comonomer, and passing the effluent to a high pressure recovery system comprising a. a high pressure separation step for separating a vapour comprising unreacted monomer and unreacted comonomer from said solids, and b. a high pressure recycle system for recycling a portion of the vapour to the polymerisation reaction, 3) Passing the solids from the high pressure recovery system to a low pressure recovery system comprising a. a low pressure separation step for separating further unreacted monomer and unreacted comonomer from said solids, and b. a low pressure recycle system for recycling at least a portion of the unreacted monomer and unreacted comonomer to the polymerisation reaction, characterised in that a portion of the vapour separated in step 2(a) is passed to the low pressure recovery system.